Share via


Create an Azure Databricks connection on Microsoft Power Platform

This page explains how to connect to Azure Databricks from Microsoft Power Platform by creating an Azure Databricks connection. You can use your Azure Databricks data to create Power canvas apps, Power Automate flows, and Copilot Studio agents.

Before you begin

Before you connect to Azure Databricks from Power Platform, you must meet the following requirements:

  • You have a Microsoft Entra ID (formerly Azure Active Directory) account.
  • You have a premium Power Apps license.
  • You have a Azure Databricks account.
  • You have access to a SQL warehouse in Azure Databricks.

Optional: Connect with Azure Virtual Networks

If your Azure Databricks workspace uses virtual networks, there are two ways to connect:

  • Integrate Power Platform with resources inside your virtual network without exposing them over the public internet. To connect to the private endpoint of your Azure Databricks workspace, do the following after you configure private connectivity to Azure Databricks:

    1. Set up virtual network support for Power Platform.
    2. If your Power Platform virtual network (whether Primary or Secondary) is different than your Azure Databricks virtual network, use virtual network peering to connect the virtual network with Azure Databricks.

    For more information about virtual networks, see Virtual Network support overview.

  • Enable access with hybrid deployment, where a front-end private link with a public endpoint is protected by a workspace IP access list. To enable access, do the following:

    1. Enable public access at workspace level. For more details, see Configure IP access lists for workspaces.
    2. Add the AzureConnectors IP range, or specific Power Platform IP range based on your environment’s region, to your workspace IP access list.

Optional: Create a Microsoft Entra Service Principal

Important

If Azure Databricks and Power Platform are in different tenants, you must use service principals for authentication.

Before connecting, complete the following steps to create, set up, and assign a Microsoft Entra Service Principal to your Azure Databricks account or workspace:

Add an Azure Databricks connection

Note

If you're using Copilot Studio, the Azure Databricks connector must be defined using Power Apps or Power Automate. Then it can be used in Copilot Studio.

To add an Azure Databricks connection, do the following:

  1. In Power Apps or Power Automate, from the sidebar, click Connections.

    If you don't see Connections on the sidebar, click More > Connections.

  2. In the upper-left corner, click + New connection.

  3. Using the search bar in the upper-right, search for "Azure Databricks".

  4. Click the Azure Databricks tile.

  5. Select your Authentication type from the drop down menu and enter your authentication information.

    • If your Power Platform deployment and Azure Databricks account are in the same Microsoft Entra ID tenant, you can use OAuth connection. Enter the following information:

      • For Server Hostname, enter the Azure Databricks SQL warehouse server hostname.
      • For HTTP Path, enter the SQL warehouse HTTP path.
      • Click Create.
      • Sign in with your Microsoft Entra ID.
    • Service principal connection can be used in any scenario. Before connecting, create a Microsoft Entra service principal. Enter the following information:

      • For Client ID, enter the service principal ID.
      • For Client Secret, enter the service principal secret.
      • For Tenant, enter the service principal tenant.
      • For Hostname, enter the Azure Databricks SQL warehouse server hostname.
      • For HTTP Path, enter the SQL warehouse HTTP path.
      • (Optional) You can rename or share the service principal connection with your team members after the connection is created.

    To find your Azure Databricks SQL warehouse and HTTP path connection details, see Get connection details for an Azure Databricks compute resource.

  6. Click Create.

Add Azure Databricks to a data policy

By adding Azure Databricks to a Business data policy, Azure Databricks can't share data with connectors in other groups. This protects your data and prevents it from being shared with those who should not have access to it. For more information, see Manage data policies.

To add the Azure Databricks connector to a Power Platform data policy:

  1. From any Power Platform application, click the settings gear in the upper-right side, and click Admin Center.
  2. From the sidebar, click Policies > Data Policies.
    • If you are using the new admin center, click Security > Data and Privacy > Data Policy.
  3. Click + New Policy or an existing policy.
  4. If creating a new policy, enter a name.
  5. Select an environment to add to your policy to and click + Add to policy above.
  6. Click Next.
  7. Search for and click the Azure Databricks connector.
  8. Click Move to Business and click Next.
  9. Review your policy and click Create policy.

Limitations

  • The Power Platform connector does not support government clouds.

Next steps